Thwarting Adversarial Examples: An L_0-Robust Sparse Fourier Transform
暂无分享,去创建一个
[1] Yi Ma,et al. Robust principal component analysis? , 2009, JACM.
[2] Alexandros G. Dimakis,et al. The Robust Manifold Defense: Adversarial Training using Generative Models , 2017, ArXiv.
[3] Piotr Indyk,et al. Approximation Algorithms for Model-Based Compressive Sensing , 2014, IEEE Transactions on Information Theory.
[4] Piotr Indyk,et al. Better Approximations for Tree Sparsity in Nearly-Linear Time , 2017, SODA.
[5] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[6] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[7] Deanna Needell,et al. CoSaMP: Iterative signal recovery from incomplete and inaccurate samples , 2008, ArXiv.
[8] Dan Boneh,et al. Ensemble Adversarial Training: Attacks and Defenses , 2017, ICLR.
[9] Piotr Indyk,et al. Nearly optimal sparse fourier transform , 2012, STOC '12.
[10] Piotr Indyk,et al. Nearly Linear-Time Model-Based Compressive Sensing , 2014, ICALP.
[11] Lujo Bauer,et al. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition , 2016, CCS.
[12] Piotr Indyk,et al. (Nearly) Sample-Optimal Sparse Fourier Transform , 2014, SODA.
[13] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[14] Mike E. Davies,et al. Iterative Hard Thresholding for Compressed Sensing , 2008, ArXiv.
[15] Piotr Indyk,et al. Simple and practical algorithm for sparse Fourier transform , 2012, SODA.
[16] Roland Vollgraf,et al. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms , 2017, ArXiv.
[17] Seyed-Mohsen Moosavi-Dezfooli,et al. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[18] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[19] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[20] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[22] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[23] Yann LeCun,et al. The mnist database of handwritten digits , 2005 .
[24] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[25] Atul Prakash,et al. Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.